1 00:00:02,170 --> 00:00:10,840 Well, hello again, and we are going to see now that second layer we have in the second layer the data 2 00:00:10,840 --> 00:00:14,800 leak, and we have some layers in this layer. 3 00:00:15,520 --> 00:00:18,510 We have to some layer that is called Mac. 4 00:00:19,390 --> 00:00:20,680 And as the. 5 00:00:23,120 --> 00:00:29,690 This is this Lear is more smart than physical and less smarter than network, it is. 6 00:00:30,170 --> 00:00:34,070 It works with the physical, physical address and error detection. 7 00:00:34,850 --> 00:00:39,950 And see our Z Acknowledgments backwards frame. 8 00:00:40,100 --> 00:00:42,770 Heather and Taylor. 9 00:00:43,090 --> 00:00:44,600 Bridget, what is it? 10 00:00:46,010 --> 00:00:53,210 Well, in this layer, it takes the message from physical than bytes, and it will end in the beginning 11 00:00:53,210 --> 00:01:01,700 of the the the message of the bytes and the end of the bytes, another message and other messages so 12 00:01:01,700 --> 00:01:04,640 it can be transferred to the network. 13 00:01:05,930 --> 00:01:08,030 So the network will understand. 14 00:01:09,840 --> 00:01:17,940 The following concept, by the way, and this in this layer, the the main machines that works in it, 15 00:01:18,360 --> 00:01:21,120 remember very well bridges or switches. 16 00:01:21,930 --> 00:01:23,880 But remember, this word is. 17 00:01:25,920 --> 00:01:29,030 And unconsidered is like we said before, Frank. 18 00:01:30,050 --> 00:01:30,530 No. 19 00:01:32,950 --> 00:01:36,200 We have in the third layer, as we said, the network. 20 00:01:37,330 --> 00:01:44,440 How does it how does the network work when we receive the message from the data link? 21 00:01:45,190 --> 00:01:52,900 The message that it have the main message from physical plus the heather plus the left part. 22 00:01:54,100 --> 00:02:01,300 It gives the networks the the beginning and least it gives it the direction. 23 00:02:02,020 --> 00:02:05,740 Where does the message should go? 24 00:02:06,610 --> 00:02:14,410 Is it going on this road or on this road or it's going to be on this way or we are going to see if it's 25 00:02:14,440 --> 00:02:14,860 us? 26 00:02:15,400 --> 00:02:23,290 It gives it the direction and it means and to deliver a geological address and fragmentation or seek 27 00:02:23,290 --> 00:02:23,710 within. 28 00:02:25,750 --> 00:02:27,490 For me, you wrote you. 29 00:02:29,790 --> 00:02:34,410 And you is major other units and. 30 00:02:35,870 --> 00:02:46,670 It is in this part that when we receive that, this frame would transfer it to a logical address and 31 00:02:46,670 --> 00:02:48,890 we call it fragmentation. 32 00:02:49,890 --> 00:02:55,440 Or a sequence, but we may would call it a. 33 00:02:57,280 --> 00:02:58,000 A bucket. 34 00:02:59,190 --> 00:03:05,490 The message that we get from network to transport, which is the second, the fourth layer or the second 35 00:03:05,490 --> 00:03:13,680 layer after, and it's what we call the baggage and the mainly mainly in this part. 36 00:03:15,270 --> 00:03:20,520 Rotors, rotors are the machines that works in this layer. 37 00:03:23,240 --> 00:03:28,880 And we have next the fourth layer, which is transport. 38 00:03:31,310 --> 00:03:32,180 Transport. 39 00:03:33,650 --> 00:03:42,620 It receives the budget and transferred to another mission, which is going to add another and another 40 00:03:43,040 --> 00:03:49,790 the last part, and we are going to call it segment fragment, and we have a fragmentation or sequencing 41 00:03:49,790 --> 00:03:56,480 of data, reliable delivery, error recovery, flow control and multiplexing. 42 00:03:57,840 --> 00:03:59,520 And we have airports. 43 00:03:59,880 --> 00:04:01,140 What is multiplexing? 44 00:04:01,530 --> 00:04:07,770 We are going to see it in the course of advancing the Cisco packet tracer. 45 00:04:09,000 --> 00:04:10,020 The of part. 46 00:04:11,000 --> 00:04:15,380 And now which type of machines or which type of. 47 00:04:18,480 --> 00:04:27,820 Which type of machines that works on this layer we have here ports, what our ports boards are, the 48 00:04:27,840 --> 00:04:31,410 entrance or it can do also the exit. 49 00:04:32,600 --> 00:04:38,600 In a in a in or alter or maybe a switch or maybe a hub is the place where we put the wire or the cable, 50 00:04:38,870 --> 00:04:43,370 and mainly it is going to be in our course and our G 45 cable. 51 00:04:45,560 --> 00:04:51,780 We have, again, transparent data service and some firewalls. 52 00:04:51,800 --> 00:04:58,910 There is there is some firewall that works that work in this layer just to have local control. 53 00:04:58,970 --> 00:05:00,890 Yes, indeed we have that. 54 00:05:02,180 --> 00:05:02,930 And. 55 00:05:04,250 --> 00:05:07,850 See you for the next three years.